메뉴 건너뛰기




Volumn , Issue , 2014, Pages 25-34

On lawful disclosure of personal user data: What should app developers do?

Author keywords

Anonymisation; Big Data; EU Data Protection Legislation; Legal Requirements; Mobile App Development; Privacy by Design

Indexed keywords

BIG DATA; MOBILE DEVICES;

EID: 84908626400     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RELAW.2014.6893479     Document Type: Conference Paper
Times cited : (26)

References (63)
  • 1
    • 84866107712 scopus 로고    scopus 로고
    • Privacy in the age of big data: A time for big decisions
    • O. Tene, J. Polonetsky, "Privacy in the Age of Big Data: a Time for Big Decisions," Stanford Law Review, vol. 64, pp. 63-69, 2012.
    • (2012) Stanford Law Review , vol.64 , pp. 63-69
    • Tene, O.1    Polonetsky, J.2
  • 2
    • 84908623993 scopus 로고    scopus 로고
    • Accessed 1 6 2014
    • P. Olson, "Meet The Company That Tracks More Phones Than Google Or Facebook," 30 10 2013. [Online]. Available: http://www.forbes.com/sites/parmyolson/2013/10/30/meet-thecompany-that-tracks-more-phones-than-google-or-facebook/.[Accessed 1 6 2014].
    • (2013) Meet the Company That Tracks More Phones Than Google or Facebook , vol.30 , Issue.10
    • Olson, P.1
  • 7
    • 77957594024 scopus 로고    scopus 로고
    • Broken promises of privacy: Responding to the surprising failure of anonymization
    • P. Ohm, "Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization," UCLA Law Review, vol. 57, pp. 1701-1777, 2010.
    • (2010) UCLA Law Review , vol.57 , pp. 1701-1777
    • Ohm, P.1
  • 10
    • 84908657937 scopus 로고    scopus 로고
    • The distinction between privacy and data protection in the jurisprudence of the CJEU and the ECtHR
    • J. Kokott and C. Sobotta, "The Distinction between Privacy and Data Protection in the Jurisprudence of the CJEU and the ECtHR," International Data Privacy Law, vol. 3, no. 4, 2013.
    • (2013) International Data Privacy Law , vol.3 , Issue.4
    • Kokott, J.1    Sobotta, C.2
  • 12
    • 83655202879 scopus 로고    scopus 로고
    • Stealing Reality: When Criminals become Data Scientists (or Vice Versa)
    • Y. Altshuler, N. Aharony, A. Pentland, et al., "Stealing Reality: when Criminals become Data Scientists (or Vice Versa)," IEEE Intelligent Systems Magazine, vol. 26, no. 6, pp. 22-30, 2011.
    • (2011) IEEE Intelligent Systems Magazine , vol.26 , Issue.6 , pp. 22-30
    • Altshuler, Y.1    Aharony, N.2    Pentland, A.3
  • 18
    • 84908645607 scopus 로고    scopus 로고
    • Digital Rights Ireland, C-293/12 and C-594/12
    • European Court of Justice, Digital Rights Ireland, C-293/12 and C-594/12, 2014.
    • (2014) European Court of Justice
  • 19
    • 84908623989 scopus 로고    scopus 로고
    • 21 5 2014. [Online]. Available: [Accessed 23 5
    • D. Tokmetzis, "Dit gebeurt er allemaal onder de motorkap van je smartphone," 21 5 2014. [Online]. Available: https://decorrespondent.nl/1034/dit-gebeurt-er-allemaal-onderde-motorkap-van-je-smartphone/50352698-785491ea. [Accessed 23 5 2014].
    • (2014) Dit Gebeurt Er Allemaal Onder de Motorkap Van Je Smartphone
    • Tokmetzis, D.1
  • 21
    • 84863575605 scopus 로고    scopus 로고
    • 17 December 2010. [Online]. Available Accessed 25 5
    • S. Thurm, Y.I. Kane, "Your Apps Are Watching You," 17 December 2010. [Online]. Available: http://online.wsj.com/news/articles/SB100014240527487046940 04576020083703574602mg=reno64-wsjurl=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10 001424052748704694004576020083703574602.html. [Accessed 25 5 2014].
    • (2014) Your Apps Are Watching You
    • Thurm, S.1    Kane, Y.I.2
  • 22
    • 84884255550 scopus 로고    scopus 로고
    • Privacy self-management and the consent dilemma
    • D. Solove, "Privacy Self-Management and the Consent Dilemma," Harvard Law Review, vol. 126, pp. 1879-2139, 2013.
    • (2013) Harvard Law Review , vol.126 , pp. 1879-2139
    • Solove, D.1
  • 23
    • 19944367736 scopus 로고    scopus 로고
    • Personal Privacy through Understanding and Action: Five Pitfalls for Designers
    • S. Lederer, J.I. Hong, A.K. Dey, and J.A. Landay, "Personal Privacy through Understanding and Action: Five Pitfalls for Designers," Personal and Ubiquitous Computing, vol. 8, no. 6, pp. 440-454, 2004.
    • (2004) Personal and Ubiquitous Computing , vol.8 , Issue.6 , pp. 440-454
    • Lederer, S.1    Hong, J.I.2    Dey, A.K.3    Landay, J.A.4
  • 34
    • 82955190606 scopus 로고    scopus 로고
    • Analyzing facebook privacy settings: User expectations vs reality
    • Y. Liu, K.P. Gummadi, B. Krishnamurthy, and A. Mislove, "Analyzing Facebook Privacy Settings: User Expectations vs. Reality," in SIGCOMM, 2011.
    • (2011) SIGCOMM
    • Liu, Y.1    Gummadi, K.P.2    Krishnamurthy, B.3    Mislove, A.4
  • 41
    • 11844281385 scopus 로고    scopus 로고
    • State-of-the-art in privacy preserving data mining
    • V.S. Verykios, E. Bertino, I.N. Fovino, et al., "State-of-the-Art in Privacy Preserving Data Mining," in SIGMOD, 2004.
    • (2004) SIGMOD
    • Verykios, V.S.1    Bertino, E.2    Fovino, I.N.3
  • 42
    • 46749122242 scopus 로고    scopus 로고
    • Privacy-preserving collaborative filtering using randomized pertubation techniques
    • H. Polat and W. Du, "Privacy-Preserving Collaborative Filtering Using Randomized Pertubation Techniques," in International Conference on Data Mining, 2003.
    • (2003) International Conference on Data Mining
    • Polat, H.1    Du, W.2
  • 47
    • 70349832810 scopus 로고    scopus 로고
    • How to break anonymity of the netflix prize dataset
    • A. Narayanan and V. Schmatikov, "How to Break Anonymity of the Netflix Prize Dataset," in CORR, 2006.
    • (2006) CORR
    • Narayanan, A.1    Schmatikov, V.2
  • 52
    • 0036811662 scopus 로고    scopus 로고
    • K-Anonymity: A model for protecting privacy
    • L. Sweeney, "K-Anonymity: a Model for Protecting Privacy," International Journal on Uncertainty, vol. 10, no. 5, pp. 557-570, 2002.
    • (2002) International Journal on Uncertainty , vol.10 , Issue.5 , pp. 557-570
    • Sweeney, L.1
  • 56
    • 85143190436 scopus 로고    scopus 로고
    • In the best families: Tracking and relationships
    • C. Mancini, Y. Roggers, K. Thomas, et al., "In the Best Families: Tracking and Relationships," in CHI, 2011.
    • (2011) CHI
    • Mancini, C.1    Roggers, Y.2    Thomas, K.3
  • 57
    • 84870703690 scopus 로고    scopus 로고
    • Privacy arguments: Analysing selective disclosure requirements for mobile applications
    • T.T. Tun, A.K. Bandara, B.A. Price, et al., "Privacy arguments: analysing selective disclosure requirements for mobile applications," in IEEE Computer Society, 2012.
    • (2012) IEEE Computer Society
    • Tun, T.T.1    Bandara, A.K.2    Price, B.A.3
  • 58
    • 84908623968 scopus 로고    scopus 로고
    • Engineering Adaptive Privacy: On the role of privacy awareness requirements
    • I. Omoronyia, L. Cavallaro, M. Salehie, et al., "Engineering Adaptive Privacy: on the role of privacy awareness requirements," in ACM ICSE, 2013.
    • (2013) ACM ICSE
    • Omoronyia, I.1    Cavallaro, L.2    Salehie, M.3
  • 62
    • 84908623966 scopus 로고    scopus 로고
    • EU Parliament EU Council Directive
    • EU Parliament and EU Council, Directive 2002/58/EC as revised by 2009/136/EC, http://eurlex. europa.eu/LexUriServ/LexUriServ.douri=OJ:L:2009:337:0 011:0036:en:PDF, 2009.
    • (2002) 58/EC As Revised by 2009/136/EC


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.